Another View: You might be helping computer hackers

Authorities worldwide are mopping up after an international ransomware attack disrupted hospitals, factories, government agencies, banks and businesses in 150 countries. The latest clues point to hackers possibly linked to North Korea.

In what looks to be an unrelated cyberattack, hackers reportedly shanghaied the Disney film “Pirates of the Caribbean: Dead Men Tell No Tales.” The crooks threatened to splash it onto the internet before the film’s scheduled May 26 release if Disney didn’t fork over a ransom in bitcoin, according to

Experts warn that worldwide ransomware attacks could bloom again in the coming weeks. They warn that many computers running outdated (or stolen) software could be vulnerable to hackers who pilfer data, or hold it hostage for ransom.

Hmm. When have we read about similar breaches and often heard similar warnings about computer vulnerabilities?

Oh, right. In 2016, when the Russians were roaming through the Democratic National Committee’s email system.

Or in 2015, when the U.S. government revealed that hackers stole a massive trove of data from the federal Office of Personnel Management, exposing sensitive information about millions of people, including federal employees, contractors and their families and friends.

Or when hackers spread Sony’s secrets across the internet in 2014.

Or when Russian cybercriminals stole data on more than 500 million Yahoo accounts the same year.

Or earlier this year after WikiLeaks revealed CIA computer hacking secrets for criminals, spies and other foreign malefactors to exploit. (We haven’t heard much about the fallout from that, but stay tuned.)

Before the latest series of attacks, officials at Britain’s public health system ignored several warnings that many of its computer systems were unprotected and ripe for exploitation, The New York Times reported.

Apparently, the official attitude there is the same as it is around the world as people are bombarded by cyber warnings…

Read the full article from the Source…

Leave a Reply

Your email address will not be published. Required fields are marked *